9.8
CVSSv3

CVE-2021-3420

Published: 05/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A flaw was found in newlib in versions before 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

newlib project newlib

fedoraproject fedora 32

fedoraproject fedora 33

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #984424 CVE-2021-3420 Package: src:libnewlib-nano; Maintainer for src:libnewlib-nano is Keith Packard <keithp@keithpcom>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 3 Mar 2021 16:34:18 UTC Severity: important Tags: security, upstream Found in version libnewlib-nano/2112- ...
A flaw was found in newlib in versions prior to 400 Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow ...

ICS Advisories

Multiple RTOS (Update D)
Critical Infrastructure Sectors: Energy

Recent Articles

BadAlloc: Microsoft looked at memory allocation code in tons of devices and found this one common security flaw
The Register • Chris Williams, Editor in Chief • 29 Apr 2021

Integer overflows leave IoT, OT, medical gear vulnerable to heap-seeking missiles The Internet of Things is a security nightmare, latest real-world analysis reveals: Unencrypted traffic, network crossover, vulnerable OSes

Microsoft has taken a look at memory management code used in a wide range of equipment, from industrial control systems to healthcare gear, and found it can be potentially exploited to hijack devices. The Windows giant has urged folks to get the latest firmware releases that address the holes, and test and deploy them, if possible. And if not, take steps to segment devices on the network, monitor them, and reduce access to them to lessen the blow if a compromise occurs. Drilling down to the nitt...